Biztonsági szemle
![Nigerian Nationals Arrested](/sites/default/files/styles/narrow_1x/public/feeds/0f/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg.webp?itok=ERhtHgCH)
2024. júl. 24.
Biztonsági szemle
Suspected Scattered Spider member apprehended
Such an arrest, which was based on suspected Blackmail and Computer Misuse Act violations and also resulted in the sequestration of the teen's digital devices.
![Spyware In Your Data](/sites/default/files/styles/narrow_1x/public/feeds/ff/032923_spyware.jpg.webp?itok=ZooI_VEt)
2024. júl. 24.
Biztonsági szemle
US-based lawsuits against NSO Group supported by leading tech firms
Numerous major U.S. tech firms, including Microsoft and Google, have issued an amicus brief supporting NSO Group victims' filing of lawsuits against the Israeli spyware firm.
![Plain code with the word "cyberattack" in red.](/sites/default/files/styles/narrow_1x/public/feeds/25/040324_cyberattack.jpg.webp?itok=zdn-AaRl)
2024. júl. 24.
Biztonsági szemle
Unprecedented global cyberattack prevalence reported in Q2
Such unprecedented increase in cyberattack prevalence has been fueled by increasingly sophisticated threat actors and advancements in artificial intelligence and machine learning, an analysis from Check Point revealed.
![](/sites/default/files/styles/narrow_1x/public/feeds/3a/GoogleChrome%281800%29-imageBROKER-Alamy.jpg.webp?itok=xZpctURl)
2024. júl. 24.
Biztonsági szemle
Navigating the Complex Landscape of Web Browser Security
The more we use the cloud, the more maintaining browser security becomes crucial.
![North Korea flag with circuitry and fingerprint](/sites/default/files/styles/narrow_1x/public/feeds/86/0824_north_korea.jpg.webp?itok=HeTGQdBc)
2024. júl. 24.
Biztonsági szemle
KnowBe4 targeted by fake North Korean IT worker
Within 25 minutes of having received his Mac workstation, the North Korean operative — who used VPN to conceal the location of the IT mule farm where the workstation was sent — leveraged Raspberry Pi to facilitate malware downloads, session history...
![Patchwork](/sites/default/files/styles/narrow_1x/public/feeds/db/patchwork_1022486.jpg.webp?itok=qhPlleQ-)
2024. júl. 24.
Biztonsági szemle
Updated attack arsenal touted by Patchwork
Intrusions conducted by PatchWork commenced with the distribution of a malicious LNK file enabling the download of a fraudulent PDF to conceal compromise with Brute Ratel C4 and PGoShell malware.
![concept of leaky software, data with a tap sticking out.3d illustration](/sites/default/files/styles/narrow_1x/public/feeds/53/020624_data_leak.jpg.webp?itok=1wEy57X2)
2024. júl. 24.
Biztonsági szemle
Unprotected cloud database exposes 769M ClickBalance records
Information exposed by the misconfigured ClickBalance database included API keys, access tokens, secret keys, tax identification numbers, and bank account numbers, as well as more than 381,000 email addresses.
![<p>Credit: Adobe Stock Images</p>](/sites/default/files/styles/narrow_1x/public/feeds/47/Hacker_AdobeStockImages_cropped-1-scaled.jpg.webp?itok=tISNcLre)
2024. júl. 24.
Biztonsági szemle
BreachForums 1.0 site members' info exposed
Included in the leaked database were BreachForums 1.0 members' user IDs, login names, email addresses, registration IP addresses, and last used IP addresses.
![Encryption your data. Digital Lock. Hacker attack and data breach. Big data with encrypted computer code. Safe your data. Cyber internet security and privacy concept. Database storage 3d illustration](/sites/default/files/styles/narrow_1x/public/feeds/61/GilDabahCol-e1704835108226.jpg.webp?itok=oYDczt83)
2024. júl. 24.
Biztonsági szemle
US defense contractor Leidos' data leaked
Such exposed information may have been exfiltrated from a compromised Diligent Corp. system leveraged by Leidos for internal investigation data hosting, noted a source close to the matter.
![DNS security](/sites/default/files/styles/narrow_1x/public/feeds/83/MarkFleggColAUG-e1693420647904.jpg.webp?itok=clrEvpyq)
2024. júl. 24.
Biztonsági szemle
Suspected DNS hijacking impacts dYdX v3 website
With the impacted site potentially still being cached, users have been urged by dYdX to ensure that their browsers are restarted and caches cleared before visiting the website.
![The CrowdStrike logo and a blue computer screen appeared during](/sites/default/files/styles/narrow_1x/public/feeds/33/071924_crowdstrike_outage.jpg.webp?itok=b7yQe6l_)
2024. júl. 24.
Biztonsági szemle
CrowdStrike outage exploited to spread new Daolpu infostealer
Attackers leveraged phishing emails with a malicious Word attachment having the same text as Microsoft's support bulletin regarding its Recovery Tool for outage-hit devices that contains macros, which when enabled facilitates the download of a DLL...
![Data security](/sites/default/files/styles/narrow_1x/public/feeds/87/072324_data_security.jpg.webp?itok=ke08KiAc)
2024. júl. 24.
Biztonsági szemle
In Snowflake’s wake, teams can no longer afford weak data security
We can keep data secure, but we have to overcome perception and cultural issues and develop standards and more effective tools.
Oldalszámozás
- Előző oldal ‹‹
- 6. oldal
- Következő oldal ››